New Report Casts Blame for Widespread Cyberattacks on Iranian Hackers

A new report contends Iranian hackers stole confidential information from government agencies and major companies in 16 countries during at least the last two years. Security vendor Cylance says the ongoing attacks, which it calls  “Operation Cleaver," stole documents and wrested control of computer networks of organizations located in nations including Canada, China, India, Israel, Mexico, Pakistan, South Korea, Turkey, the United Arab Emirates, and the US. The organizations were in the military, energy, transportation, telecommunications, technology, and other industry sectors. Cylance says it has evidence these intrusions were made by the same Iran-based group responsible for a 2013 attack on the US Navy computer network. Hamid Babaei, spokesperson for Iran's mission to the United Nations, said these claims are “a baseless and unfounded allegation fabricated to tarnish the Iranian government image, particularly aimed at hampering current nuclear talks.”. According to Cylance’s report, the hackers used a combination of off-the-shelf and custom tools to infiltrate target computer systems. “We discovered the scope and damage of these operations during investigations of what we thought were separate cases,” said company CEO Stuart McClure. “Due to the choice of critical infrastructure victims and the Iranian team’s quickly improving skillset, we are compelled to publish this report.” Although based in Tehran, the company said, the hackers receive help from people in Canada, the Netherlands, and the UK. Cylance said it has traced the attacks to June 2012, although they may have begun as early as 2010. Cylance shared its findings with the victims and the US Federal Bureau of Investigation. (PC Mag)(USA Today)(Reuters)


Hackers Leak More Sony Confidential Documents Online

Hackers have posted online more private documents that they stole from Sony Pictures Entertainment in late November. In addition to stealing files, the attackers, known as Guardians of Peace or #GOP, crippled the movie studio’s computer systems. The hackers uploaded five unreleased Sony films online, but the latest documents to surface were spreadsheets containing employee home addresses and compensation, including pre-bonus salaries of executives, a carefully guarded industry secret. The hackers uploaded the files to Pastebin, an anonymous Internet posting site. Security experts say North Korea may have launched the attack in response to a forthcoming Sony comedy about an assassination attempt on the country’s leader, Kim Jong-un, which the nation’s leaders have criticized. (International Business Times)(Gizmodo)(The New York Times)

US FBI Issues Warning to Businesses about Destructive Malware

The US Federal Bureau of Investigation has issued a “flash” warning to US businesses stating that hackers are using malware to launch a destructive domestic cyberattack. The five-page, confidential report contained technical details about the malware and how to prevent and respond to it. The malware reportedly overrides all data on computer hard drives, including the master boot record, and thus keeps infected computers from booting up. The malware is thought to be the same as that used in breach last week at Sony Pictures Entertainment. The FBI has not commented publicly on its warning and did not say how many companies were victims of the destructive software. However, the agency did say these are the first such attacks of this type in the US. “I believe the coordinated cyberattack with destructive payloads against a corporation in the US represents a watershed event,” Tom Kellermann, chief cybersecurity officer with security-software maker Trend Micro Inc., told Reuters. (CNET)(Engadget)(Reuters)

Apple iPod Antitrust Jury Trial Starts

A class action antitrust suit originally filed against Apple on 3 January 2005, which could cause the company to pay about $1 billion in damages, will finally be heard in an Oakland, California, court. The original plaintiffs—Melanie (Tucker) Wilson and Marianna Rosen —claim Apple unduly influenced the market for music players between 2006 and 2009, thereby making iPod prices higher than they would have been otherwise. The key in the case is security updates from Apple that used the company’s FairPlay digital-rights management technology to prevent files from music stores other than Apple’s iTunes from working with the iPod. , The plaintiffs say thie updates were solely designed to "suppress new products that threatened [Apple's] monopolies in the relevant product markets." Apple says that it blocked competitors’ files to ensure both security and quality and that this practice benefitted consumers. Several key Apple executives are expected to testify and jurors could hear a deposition taken from Steve Jobs before he died. (CNET)(Businessweek)

Security Experts Uncover Corporate Espionage Hacking Ring

US security firm FireEye has uncovered a cyberespionage ring targeting corporate intelligence that would give the hackers inside knowledge they could use illegally to invest well in various stock markets. Starting in mid-2013, said the company, the FIN4 hacker group attacked 100 firms, primarily pharmaceutical and healthcare businesses but also investment bankers, attorneys, and investor-relations firms serving companies in these fields.  However, data was stolen from just a few publicly held companies trading on the New York Stock Exchange and NASDAQ, according to FireEye, which didn’t identify the victims. It is unclear whether the hackers made trades based on the information stolen, which included draft US Securities and Exchange Commission filings, and documents on mergers and board meetings. FIN4 stole passwords to email accounts, accessed emails, and then launched phishing attacks tailored to individual victims. The hackers reportedly used Tor to anonymize their location, but FireEye said the content of their phishing emails and the way they operate indicated they’re based in the US or Western Europe. FireEye also suspects they were trained at Western investment banks, based on how they identified targets and worded their emails. In some cases, they used information they stole as a phishing lure to make their e-mail more convincing by using privileged information. FireEye says it notified the victims it identified and the US Federal Bureau of Investigation about the attacks. (Reuters)(The New York Times)

Intel Buys Canadian Password-Application Startup

Intel has acquired PasswordBox, a Canadian identity-management technology firm, for an undisclosed amount. Intel is integrating the application—which lets users log to systems with a single tap on their screen without needing to remember their passwords—and the company’s 48 employees into the Intel Security Group. PasswordBox was founded in 2012, and its product was named the best mobile app at this year’s CES consumer-electronics trade show. (Reuters)(ZDNet)(Intel @ Business Wire)

MIT Develops Fast, Powerful, Cheetah-Inspired Robot

MIT researchers have created a robot, inspired by the cheetah,that is faster and more powerful than conventional robots. The prototype battery-powered Cheetah robot, which researchers control using video game-based technology, weighs 31 kilograms (68 pounds) – comparable to its biological counterpart -- and can run 16 kilometers (9.9 miles) per hour (10 miles/hour for 15 minutes. “This is kind of a Ferrari in the robotics world,” said Sangbae Kim, head of the MIT Biomimetic Robotics Lab. The robot is inspired by the cheetah’s speed and agility and shares its bounding gait. During the five-year, DARPA-funded development process, the researchers had to specially design the components because conventional technologies couldn’t yield the performance they wanted. Some of the components include 12 light, powerful motors controlled by and an onboard computer that also processes data from various sensors. The researchers also designed an algorithm that calculates matters such as the force each leg needs to propel the robot while still keeping it balanced. They are continuing to refine their technology and adding sensors to help the robot operate autonomously. They say their technologies and components could be applied to prosthetics, wearable technologies, and vehicles, and eventually could be used for search and rescue operations too dangerous for humans. (The Associated Press @ CBC News)(The Telegraph)(MIT Biomimetic Robotics Lab)

Google Software More Accurately Describes Photos

Google has developed artificial-intelligence software capable of more accurately describing a photo scene than previous technologies, which could make searching for specific images easier or help the visually impaired better understand a photo. The technology uses two neural networks for processing. One focuses on image recognition and processing, the other handles natural-language processing and produces full English sentences to describe photos. In tests, the software, following training, was applied to images available in openly published datasets and asked to provide a description. Against an automated test used to benchmark computer-vision software, the Google technology—which is still in development—scored in the 60s. Humans taking the same test typically score in the 70s. (BBC)(WIRED UK)(MIT Technology Review)(Google Research)

New Glass for Mobile-Device Displays Is Tougher than Previous Materials

Corning has announced the release of Gorilla Glass 4, its hardened glass designed for smartphone and tablet displays. The company claims it is roughly twice as tough as Gorilla Glass 3—based on its 80 percent rate of survival of a one-meter fall onto a rough surface—and thus should help keep screens from cracking when users drop their devices. The new material is in production and should be available in commercial devices by the end of 2014. Corning had an 80 percent share of the hardened-glass display business in 2013. Apple, Samsung, and other manufacturers of smartphones, tablets, and smartwatches use Gorilla Glass. (CNET)(re/Code)(Corning @ Market Watch)

Coding Tutorial Uses Popular Children’s Film to Attract Kids and Disney Interactive have created a new basic coding tutorial for children featuring characters from the animated film Frozen to stimulate their interest in computer science. The Artist with Anna and Elsa tutorial offers viewers information on programming concepts like loops and conditionals. The module also is embedded with short video lectures from women working in technology. is a nonprofit organization focused on expanding participation in computer science, particularly by children, women, and people of color. The tutorial project is part of the organization’s Hour of Code campaign, a one-hour introduction to computer science for tens of millions of students in 180 countries. Disney is hosting Hour of Code events at several of its offices. (Geek Wire)(The Seattle Times)(Code.Org “Artist with Anna and Elsa”)

Showing 1 - 10 of 4,575 results.
Items per Page 10
of 458